Sciweavers

41 search results - page 5 / 9
» Rights Protection for Digital Contents Redistribution Over t...
Sort
View
97
Voted
ACSAC
2010
IEEE
14 years 8 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
106
Voted
SIGCOMM
2009
ACM
15 years 4 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
79
Voted
CCS
2006
ACM
15 years 2 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
15 years 7 days ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
87
Voted
CIKM
2005
Springer
15 years 3 months ago
Internet scale string attribute publish/subscribe data networks
With this work we aim to make a three-fold contribution. We first address the issue of supporting efficiently queries over string-attributes involving prefix, suffix, containmen...
Ioannis Aekaterinidis, Peter Triantafillou